On Wed, 29 Aug 2012, "Raul da Silva {Sp4wn}" <sp4wn.root@xxxxxxxxx> wrote: > I know that we have a lot of ways to prove how effective is SELinux as cgi, > perl, shell scripts and I know that is effective but I'd like to know if > someone already tested some kind of exploit of buffer overflow attack as > demo to show how effective could be SELinux. > Any information I really appreciate A simple test of this would be to run a program like telnetd as httpd_t (or some other domain that takes remote connections) and configure it to launch a shell with no password. http://www.coker.com.au/selinux/play.html Also I have a Play Machine online right now to demonstrate how the root account can be locked down. -- My Main Blog http://etbe.coker.com.au/ My Documents Blog http://doc.coker.com.au/ -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.